To Permit or Not to Permit, That is the Usability Question: Crowdsourcing Mobile Apps’ Privacy Permission Settings

Abstract Millions of apps available to smartphone owners request various permissions to resources on the devices including sensitive data such as location and contact information. Disabling permissions for sensitive resources could improve privacy but can also impact the usability of apps in ways users may not be able to predict. We study an efficient approach that ascertains the impact of disabling permissions on the usability of apps through large-scale, crowdsourced user testing with the ultimate goal of making recommendations to users about which permissions can be disabled for improved privacy without sacrificing usability. We replicate and significantly extend previous analysis that showed the promise of a crowdsourcing approach where crowd workers test and report back on various configurations of an app. Through a large, between-subjects user experiment, our work provides insight into the impact of removing permissions within and across different apps (our participants tested three apps: Facebook Messenger (N=218), Instagram (N=227), and Twitter (N=110)). We study the impact of removing various permissions within and across apps, and we discover that it is possible to increase user privacy by disabling app permissions while also maintaining app usability.

[1]  Malcolm Hall,et al.  ProtectMyPrivacy: detecting and mitigating privacy leaks on iOS devices using crowdsourcing , 2013, MobiSys '13.

[2]  David A. Wagner,et al.  Android Permissions Remystified: A Field Study on Contextual Integrity , 2015, USENIX Security Symposium.

[3]  Karl Aberer,et al.  The Curious Case of the PDF Converter that Likes Mozart: Dissecting and Mitigating the Privacy Risk of Personal Cloud Apps , 2016, Proc. Priv. Enhancing Technol..

[4]  Diomidis Spinellis,et al.  Trusted third party services for deploying secure telemedical applications over the WWW , 1999, Comput. Secur..

[5]  Studying the effectiveness of android application permissions requests , 2013, 2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops).

[6]  Norman M. Sadeh,et al.  Modeling Users' Mobile App Privacy Preferences: Restoring Usability in a Sea of Permission Settings , 2014, SOUPS.

[7]  Blase Ur,et al.  Measuring password guessability for an entire university , 2013, CCS.

[8]  Norman M. Sadeh,et al.  Expectation and purpose: understanding users' mental models of mobile app privacy through crowdsourcing , 2012, UbiComp.

[9]  Robert Kosara,et al.  Do Mechanical Turks dream of square pie charts? , 2010, BELIV '10.

[10]  L. Jean Camp,et al.  Peer-produced privacy protection , 2013, 2013 IEEE International Symposium on Technology and Society (ISTAS): Social Implications of Wearable Computing and Augmediated Reality in Everyday Life.

[11]  Philip D. Waggoner,et al.  Are samples drawn from Mechanical Turk valid for research on political ideology? , 2015 .

[12]  Steve Hanna,et al.  Android permissions demystified , 2011, CCS '11.

[13]  Ernesto Damiani,et al.  P2P-based collaborative spam detection and filtering , 2004 .

[14]  Lorrie Faith Cranor,et al.  Privacy as part of the app decision-making process , 2013, CHI.

[15]  Michael K. Reiter,et al.  Resilient Authentication Using Path Independence , 1998, IEEE Trans. Computers.

[16]  L. Jean Camp,et al.  PEER PATCHING - RAPID RESPONSE IN DISTRIBUTED SYSTEMS , 2004 .

[17]  Ahmad-Reza Sadeghi,et al.  Towards Taming Privilege-Escalation Attacks on Android , 2012, NDSS.

[18]  Kang G. Shin,et al.  Location Privacy Protection for Smartphone Users , 2014, CCS.

[19]  David A. Wagner,et al.  Android permissions: user attention, comprehension, and behavior , 2012, SOUPS.

[20]  Irit Dinur,et al.  Revealing information while preserving privacy , 2003, PODS.

[21]  Adrian Perrig,et al.  Perspectives: Improving SSH-style Host Authentication with Multi-Path Probing , 2008, USENIX Annual Technical Conference.

[22]  L. Jean Camp,et al.  PeerSec: Towards Peer Production and Crowdsourcing for Enhanced Security , 2012, HotSec.

[23]  Carol J. Fung,et al.  Dude, ask the experts!: Android resource access permission recommendation with RecDroid , 2015, 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM).

[24]  Simin Nadjm-Tehrani,et al.  Crowdroid: behavior-based malware detection system for Android , 2011, SPSM '11.

[25]  Hao Chen,et al.  Quantifying the Effects of Removing Permissions from Android Applications , 2013 .

[26]  Lorrie Faith Cranor,et al.  A Conundrum of Permissions: Installing Applications on an Android Smartphone , 2012, Financial Cryptography Workshops.

[27]  Umesh Shankar,et al.  Doppelganger: Better browser privacy without the bother , 2006, CCS '06.

[28]  Bill Tomlinson,et al.  Who are the crowdworkers?: shifting demographics in mechanical turk , 2010, CHI Extended Abstracts.

[29]  L. Jean Camp,et al.  Privacy Tradeoffs: Myth or Reality? Panel , 2002, Financial Cryptography.

[30]  Alessandro Acquisti,et al.  Follow My Recommendations: A Personalized Privacy Assistant for Mobile App Permissions , 2016, SOUPS.

[31]  A. Acquisti,et al.  Reputation as a sufficient condition for data quality on Amazon Mechanical Turk , 2013, Behavior Research Methods.

[32]  Helen J. Wang,et al.  User-Driven Access Control: Rethinking Permission Granting in Modern Operating Systems , 2012, 2012 IEEE Symposium on Security and Privacy.

[33]  David A. Wagner,et al.  The Effectiveness of Application Permissions , 2011, WebApps.

[34]  Joseph S. Dumas,et al.  Comparison of three one-question, post-task usability questionnaires , 2009, CHI.

[35]  Laura A. Dabbish,et al.  Privacy Attitudes of Mechanical Turk Workers and the U.S. Public , 2014, SOUPS.

[36]  Jason I. Hong,et al.  Mobile Application Evaluation Using Automation and Crowdsourcing , 2013 .

[37]  Kwong-Sak Leung,et al.  A Survey of Crowdsourcing Systems , 2011, 2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing.

[38]  Matthew Lease,et al.  Crowdsourcing for Usability Testing , 2012, ASIST.

[39]  Michael K. Reiter,et al.  Crowdsourced Exploration of Security Configurations , 2015, CHI.

[40]  Haoyu Wang,et al.  Using text mining to infer the purpose of permission use in mobile apps , 2015, UbiComp.

[41]  Eran Toch,et al.  Crowdsourcing privacy preferences in context-aware applications , 2012, Personal and Ubiquitous Computing.

[42]  L. Jean Camp,et al.  Pools, clubs and security: designing for a party not a person , 2012, NSPW '12.